WO2011004977A3 - System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system - Google Patents

System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system

Info

Publication number
WO2011004977A3
WO2011004977A3 PCT/KR2010/004026 KR2010004026W WO2011004977A3 WO 2011004977 A3 WO2011004977 A3 WO 2011004977A3 KR 2010004026 W KR2010004026 W KR 2010004026W WO 2011004977 A3 WO2011004977 A3 WO 2011004977A3
Authority
WO
Grant status
Application
Patent type
Prior art keywords
forecast
cyber
threats
engine
system
Prior art date
Application number
PCT/KR2010/004026
Other languages
French (fr)
Korean (ko)
Other versions
WO2011004977A2 (en )
Inventor
백승현
박인성
이은영
윤주범
손기욱
최석진
Original Assignee
한국전자통신연구원
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0775Logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

The present invention relates to a system for an engine for forecasting cyber threats and to a method which enable the forecast of a low-level cyber threat and the forecast of a high-level cyber threat using the low-level cyber threat in a hierarchical structure of cyber threats. The system for an engine for forecasting cyber threats according to one embodiment of the present invention comprises: a forecast information database which stores forecast information including a plurality of cyber threat forecast items, a forecast schedule related to the items, forecast simulation information, forecast item hierarchical structure information, time series data on cyber threats, and sample data on cyber threats; a forecast engine core subsystem which forecasts the levels of threats for the plurality cyber threat forecast items having a hierarchical structure using the forecast information stored in the forecast information database; and a forecast engine control interface which receives control commands for the forecast engine core subsystem from a user or external system, and delivers the received control commands to the forecast engine core subsystem.
PCT/KR2010/004026 2009-07-07 2010-06-22 System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system WO2011004977A3 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR20090061602A KR101039717B1 (en) 2009-07-07 2009-07-07 Cyber Threat Forecasting Engine System for Predicting Cyber Threats and Method for Predicting Cyber Threats Using the Same System
KR10-2009-0061602 2009-07-07

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13320263 US8800037B2 (en) 2009-07-07 2010-06-22 System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system
JP2012511772A JP2012527687A (en) 2009-07-07 2010-06-22 Cyber ​​threats prediction method using the cyber threat forecast engine system and the system for predicting the cyber threats
EP20100797251 EP2453381B1 (en) 2009-07-07 2010-06-22 System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system

Publications (2)

Publication Number Publication Date
WO2011004977A2 true WO2011004977A2 (en) 2011-01-13
WO2011004977A3 true true WO2011004977A3 (en) 2011-03-31

Family

ID=43429641

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2010/004026 WO2011004977A3 (en) 2009-07-07 2010-06-22 System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system

Country Status (5)

Country Link
US (1) US8800037B2 (en)
EP (1) EP2453381B1 (en)
JP (1) JP2012527687A (en)
KR (1) KR101039717B1 (en)
WO (1) WO2011004977A3 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130185795A1 (en) * 2012-01-12 2013-07-18 Arxceo Corporation Methods and systems for providing network protection by progressive degradation of service
US20140156322A1 (en) * 2012-08-10 2014-06-05 Itron, Inc. Unified Framework for Electrical Load Forecasting
US8904526B2 (en) * 2012-11-20 2014-12-02 Bank Of America Corporation Enhanced network security
US9355172B2 (en) 2013-01-10 2016-05-31 Accenture Global Services Limited Data trend analysis
US20160212165A1 (en) * 2013-09-30 2016-07-21 Hewlett Packard Enterprise Development Lp Hierarchical threat intelligence
WO2015059791A1 (en) * 2013-10-24 2015-04-30 三菱電機株式会社 Information processing device, information processing method, and program
US9892270B2 (en) 2014-07-18 2018-02-13 Empow Cyber Security Ltd. System and method for programmably creating and customizing security applications via a graphical user interface
US9565204B2 (en) * 2014-07-18 2017-02-07 Empow Cyber Security Ltd. Cyber-security system and methods thereof
US9930059B1 (en) * 2016-03-31 2018-03-27 Lookingglass Cyber Solutions, Inc. Methods and apparatus for analyzing asynchronous cyber-threat event data using discrete time intervals
US9930062B1 (en) 2017-06-26 2018-03-27 Factory Mutual Insurance Company Systems and methods for cyber security risk assessment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7136860B2 (en) * 2000-02-14 2006-11-14 Overture Services, Inc. System and method to determine the validity of an interaction on a network
KR20080047261A (en) * 2006-11-23 2008-05-28 한국전자통신연구원 Anomaly malicious code detection method using process behavior prediction technique
KR20090001609A (en) * 2006-11-13 2009-01-09 한국전자통신연구원 Cyber threat forecasting system and method therefor
KR20090048955A (en) * 2007-11-12 2009-05-15 한국전자통신연구원 Apparatus and method for forecasting security threat level of network

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996024210A3 (en) 1995-02-02 1996-11-07 Cabletron Systems Inc Method and apparatus for learning network behavior trends and predicting future behavior of communications networks
US6076174A (en) * 1998-02-19 2000-06-13 United States Of America Scheduling framework for a heterogeneous computer network
US6996843B1 (en) * 1999-08-30 2006-02-07 Symantec Corporation System and method for detecting computer intrusions
US7603709B2 (en) * 2001-05-03 2009-10-13 Computer Associates Think, Inc. Method and apparatus for predicting and preventing attacks in communications networks
US7093132B2 (en) * 2001-09-20 2006-08-15 International Business Machines Corporation Method and apparatus for protecting ongoing system integrity of a software product using digital signatures
WO2003083660A1 (en) * 2002-03-29 2003-10-09 Global Dataguard, Inc. Adaptive behavioral intrusion detection systems and methods
US20060031938A1 (en) 2002-10-22 2006-02-09 Unho Choi Integrated emergency response system in information infrastructure and operating method therefor
US7657938B2 (en) * 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
JP4371905B2 (en) 2004-05-27 2009-11-25 富士通株式会社 Unauthorized access detection device, unauthorized access detection method, illegal access detection program and distributed denial of service attack detecting device
US7784099B2 (en) * 2005-02-18 2010-08-24 Pace University System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning
KR100625096B1 (en) 2006-03-27 2006-09-11 주식회사 윈스테크넷 Method and system of predicting and alarming based on correlation analysis between traffic change amount and hacking threat rate
US8191149B2 (en) * 2006-11-13 2012-05-29 Electronics And Telecommunications Research Institute System and method for predicting cyber threat
JP2008287435A (en) 2007-05-16 2008-11-27 Toshiba Corp Security level monitoring evaluation device and security level monitoring evaluation program
JP5125466B2 (en) 2007-12-11 2013-01-23 富士通株式会社 Unauthorized use monitoring devices, and, unauthorized use monitoring program
US20090235355A1 (en) * 2008-03-17 2009-09-17 Inventec Corporation Network intrusion protection system
WO2010101749A1 (en) * 2009-03-05 2010-09-10 Massachusetts Institute Of Technology Predictive semi-autonomous vehicle navigation system
US8756693B2 (en) * 2011-04-05 2014-06-17 The United States Of America As Represented By The Secretary Of The Air Force Malware target recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7136860B2 (en) * 2000-02-14 2006-11-14 Overture Services, Inc. System and method to determine the validity of an interaction on a network
KR20090001609A (en) * 2006-11-13 2009-01-09 한국전자통신연구원 Cyber threat forecasting system and method therefor
KR20080047261A (en) * 2006-11-23 2008-05-28 한국전자통신연구원 Anomaly malicious code detection method using process behavior prediction technique
KR20090048955A (en) * 2007-11-12 2009-05-15 한국전자통신연구원 Apparatus and method for forecasting security threat level of network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2453381A4 *

Also Published As

Publication number Publication date Type
KR101039717B1 (en) 2011-06-09 grant
EP2453381A4 (en) 2013-01-23 application
US8800037B2 (en) 2014-08-05 grant
JP2012527687A (en) 2012-11-08 application
US20120096552A1 (en) 2012-04-19 application
EP2453381A2 (en) 2012-05-16 application
EP2453381B1 (en) 2017-11-15 grant
WO2011004977A2 (en) 2011-01-13 application
KR20110004016A (en) 2011-01-13 application

Similar Documents

Publication Publication Date Title
Purves et al. Predicting and understanding forest dynamics using a simple tractable model
Beck et al. What's on the horizon for macroecology?
Fisher et al. The high costs of conserving Southeast Asia's lowland rainforests
Oommen et al. Elevational species richness patterns emerge from multiple local mechanisms in Himalayan woody plants
Figueres et al. Three years to safeguard our climate
Real et al. Species distribution models in climate change scenarios are still not useful for informing policy planning: an uncertainty assessment using fuzzy logic
Sckokai et al. Economic and environmental impacts of milk quota reform in Europe
Yemshanov et al. Mapping invasive species risks with stochastic models: a cross‐border United States‐Canada application for Sirex noctilio Fabricius
Loyola et al. Clade‐specific consequences of climate change to amphibians in Atlantic Forest protected areas
Fearnside et al. Avoided deforestation in Amazonia as a global warming mitigation measure: The case of Mato Grosso
Iwamura et al. A climatic stability approach to prioritizing global conservation investments
Martin et al. An adaptive‐management framework for optimal control of hiking near golden eagle nests in Denali National Park
Vellak et al. Past and present effectiveness of protected areas for conservation of naturally and anthropogenically rare plant species
McCarthy et al. Designing nature reserves in the face of uncertainty
Sloan et al. Does Indonesia's REDD+ moratorium on new concessions spare imminently threatened forests?
Liew et al. The determinants of land snail diversity along a tropical elevational gradient: insularity, geometry and niches
Venter et al. Overestimating conservation costs in Southeast Asia
Garzón et al. The evolution of the Pinus sylvestris L. area in the Iberian Peninsula from the last glacial maximum to 2100 under climate change
Tabarelli Tropical Biodiversity in Human‐Modified Landscapes: What is our Trump Card?
Rull The Guayana Highlands: A Promised (but Threatened) Land for Ecological and Evolutionary Science 1
Matthews et al. Quantifying and interpreting nestedness in habitat islands: a synthetic analysis of multiple datasets
Bacon et al. Geographic and Taxonomic disparities in species diversity: Dispersal and diversification rates across Wallace's line
Watson et al. Climate change adaptation planning for biodiversity conservation: A review
Köppel et al. Cautious but committed: moving toward adaptive planning and operation strategies for renewable energy’s wildlife implications
Grewe et al. Evaluating climate-chemistry response and mitigation options with AirClim

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10797251

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 13320263

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2012511772

Country of ref document: JP

REEP

Ref document number: 2010797251

Country of ref document: EP

NENP Non-entry into the national phase in:

Ref country code: DE